1. Backes, M., Chen, T., Drmuth, M., Lensch, H.P.A., Welk, M.: Tempest in a teapot: Compromising reflections revisited. In: IEEE Symposium on Security and Privacy, pp. 315–327 (2009)
2. Backes, M., Drmuth, M., Unruh, D.: Compromising reflections-or-how to read LCD monitors around the corner. In: IEEE Symposium on Security and Privacy, pp. 158–169 (2008)
3. Conde-Lagoa, D., Costa-Montenegro, E., Gonzalez-Castao, F., Gil-Castieira, F.: Secure eTickets based on QR-Codes with user-encrypted content. In: 2010 Digest of Technical Papers International Conference on Consumer Electronics (ICCE), pp. 257–258 (2010)
4. De Luca, A., Frauendienst, B., Boring, S., Hussmann, H.: My phone is my keypad: Privacy-enhanced PIN-entry on public terminals. In: Proceedings of the 21st Annual Conference of the Australian Computer-Human Interaction Special Interest Group, pp. 401–404. ACM, New York (2009), http://doi.acm.org/10.1145/1738826.1738909
5. De Luca, A., Hertzschuch, K., Hussmann, H.: ColorPIN: Securing PIN entry through indirect input. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 1103–1106. ACM, New York (2010), http://doi.acm.org/10.1145/1753326.1753490